© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.

Slides:



Advertisements
Similar presentations
Quality of Service CCDA Quick Reference.
Advertisements

Chapter 9: Access Control Lists
Simulation Study on the Effect of the trTCM Parameters Hakyong KIM R&D Center, Corecess Inc. Tel : PCS : Mail :
1 CONGESTION CONTROL. 2 Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
William Stallings Data and Computer Communications 7 th Edition Chapter 13 Congestion in Data Networks.
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
© 2006 Cisco Systems, Inc. All rights reserved. Module 4: Implement the DiffServ QoS Model Lesson 4.7: Introducing Traffic Policing and Shaping.
24.1 Chapter 24 Congestion Control and Quality of Service Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1.  Congestion Control Congestion Control  Factors that Cause Congestion Factors that Cause Congestion  Congestion Control vs Flow Control Congestion.
Engineering Internet QoS
Chapter 10 Congestion Control in Data Networks1 Congestion Control in Data Networks and Internets COMP5416 Chapter 10.
Frame Relay CCNA4 Chapter 6.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4-1 Managing IP Traffic with ACLs Introducing ACLs.
© 2006 Cisco Systems, Inc. All rights reserved. Module 4: Implement the DiffServ QoS Model Lesson 4.10: Deploying End-to-End QoS.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
© 2006 Cisco Systems, Inc. All rights reserved. Module 4: Implement the DiffServ QoS Model Lesson 4.8: Understanding WAN Link Efficiency Mechanisms.
CCNA 5.0 Planning Guide Chapter 4: Frame Relay.
© 2006 Cisco Systems, Inc. All rights reserved. Module 4: Implement the DiffServ QoS Model Lesson 4.5: Configuring CBWFQ and LLQ.
© 2001, Cisco Systems, Inc. Traffic Shaping and Policing.
© 2001, Cisco Systems, Inc. Traffic Shaping and Policing.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Cisco S4C6 Frame Relay.
CHABOT COLLEGE CISCO NETWORKING ACADEMY Chabot College Frame Relay Part 1.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 23 Congestion Control and Quality of Service.
Quality of Service (QoS)
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Oppenheimer.
Building Differentiated Services Using the Assured Forwarding PHB Group Juha Heinänen Telia Finland Inc.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
© 2001, Cisco Systems, Inc. IP over MPLS. © 2001, Cisco Systems, Inc. QOS v1.0—11-2 Objectives Upon completing this module, you will be able to: Describe.
What is FRAME RELAY ? Frame Relay is a way of sending information over a WAN by dividing data into packets It operates at the Physical and Data Link layers.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS.
1 Congestion Control Computer Networks. 2 Where are we?
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 5: Implement Cisco AutoQoS.
Mr. Mark Welton.  WAN transportation method that formats data into frames and sent over a network controlled by a service provider  Frame Relay is often.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS.
Mr. Mark Welton.  Quality of Service is deployed to prevent data from saturating a link to the point that other data cannot gain access to it  QoS allows.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
© 2001, Cisco Systems, Inc. Course Introduction. © 2001, Cisco Systems, Inc. QOS v1.0—0-2 Course Objectives Upon completing this course, you will be able.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
© 2006 Cisco Systems, Inc. All rights reserved. Module 4: Implement the DiffServ QoS Model Lesson 4.3: Introducing Queuing Implementations.
© 2006 Cisco Systems, Inc. All rights reserved. Module 4: Implement the DiffServ QoS Model Lesson 4.6: Congestion Avoidance.
© 2006 Cisco Systems, Inc. All rights reserved. 3.2: Implementing QoS.
Semester 4 – Chapter 6 - Frame Relay Frame Relay - Industry-standard, switched data- link layer protocol that handles multiple virtual circuits using HDLC.
Lecture 8 -Traffic Management
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
1 Lecture 15 Internet resource allocation and QoS Resource Reservation Protocol Integrated Services Differentiated Services.
Muhammad Mateen Yaqoob Department of Computer Science COMSATS Institute of Information Technology, Abbottabad 1.
Chapter 3 Part 3 Switching and Bridging
Congestion Control in Data Networks and Internets
Instructor Materials Chapter 6: Quality of Service
Topics discussed in this section:
William Stallings Data and Computer Communications
Instructor Materials Chapter 6: VLANs
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Congestion Control and
© 2002, Cisco Systems, Inc. All rights reserved.
Implementing Quality of Service (QoS)
Configuring Virtual Circuits
Chapter 3 Part 3 Switching and Bridging
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Quality of Service Connecting Networks.
CONGESTION CONTROL.
Routing and Switching Essentials v6.0
Congestion Control in Data Networks and Internets
Pertemuan 24 Frame Relay Concepts
Figure Areas in an autonomous system
Chapter 11. Frame Relay Background Frame Relay Protocol Architecture
Chapter 3 Part 3 Switching and Bridging
© 2002, Cisco Systems, Inc. All rights reserved.
Presentation transcript:

© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model

© 2006 Cisco Systems, Inc. All rights reserved. Module 4: Implement the DiffServ QoS Model Lesson 4.7: Introducing Traffic Policing and Shaping

© 2006 Cisco Systems, Inc. All rights reserved. Objectives  Explain the purpose and function of traffic conditioning methods: policing and shaping.  Compare and contrast traffic policing and traffic shaping.  Give examples of how policing and shaping are used in typical network topologies.  Describe the purpose and function of a token bucket.

© 2006 Cisco Systems, Inc. All rights reserved. Traffic Conditioners  Policing Limits bandwidth by discarding traffic. Can re-mark excess traffic and attempt to send. Should be used on higher-speed interfaces. Can be applied inbound or outbound.  Shaping Limits excess traffic by buffering. Buffering can lead to a delay. Recommended for slower-speed interfaces. Cannot re-mark traffic. Can only be applied in the outbound direction.

© 2006 Cisco Systems, Inc. All rights reserved. Traffic Policing and Shaping Overview  These mechanisms must classify packets before policing or shaping the traffic rate.  Traffic policing typically drops or marks excess traffic to stay within a traffic rate limit.  Traffic shaping queues excess packets to stay within the desired traffic rate.

© 2006 Cisco Systems, Inc. All rights reserved. Why Use Policing?Why Use Shaping?  To limit access to resources when high-speed access is used but not desired (subrate access)  To limit the traffic rate of certain applications or traffic classes  To mark down (recolor) exceeding traffic at Layer 2 or Layer 3  To prevent and manage congestion in ATM, Frame Relay, and Metro Ethernet networks, where asymmetric bandwidths are used along the traffic path  To regulate the sending traffic rate to match the subscribed (committed) rate in ATM, Frame Relay, or Metro Ethernet networks  To implement shaping at the network edge

© 2006 Cisco Systems, Inc. All rights reserved. Policing Versus Shaping  Incoming and outgoing directions.  Out-of-profile packets are dropped.  Dropping causes TCP retransmits.  Policing supports packet marking or re-marking.  Outgoing direction only.  Out-of-profile packets are queued until a buffer gets full.  Buffering minimizes TCP retransmits.  Marking or re-marking not supported.  Shaping supports interaction with Frame Relay congestion indication.

© 2006 Cisco Systems, Inc. All rights reserved. Traffic Policing Example  Do not rate-limit traffic from mission-critical server.  Rate-limit file-sharing application traffic to 56 kbps.

© 2006 Cisco Systems, Inc. All rights reserved. Traffic Policing and Shaping Example  Central to remote site speed mismatch  Remote to central site oversubscription  Both situations result in buffering and in delayed or dropped packets.

© 2006 Cisco Systems, Inc. All rights reserved. Token Bucket  Mathematical model used by routers and switches to regulate traffic flow.  Tokens represent permission to send a number of bits into the network.  Tokens are put into the bucket at a certain rate by IOS.  Token bucket holds tokens.  Tokens are removed from the bucket when packets are forwarded.  If there are not enough tokens in the bucket to send the packet, traffic conditioning is invoked (shaping or policing).

© 2006 Cisco Systems, Inc. All rights reserved. Single Token Bucket  If sufficient tokens are available (conform action): Tokens equivalent to the packet size are removed from the bucket. The packet is transmitted.

© 2006 Cisco Systems, Inc. All rights reserved. Single Token Bucket Exceed Action  If sufficient tokens are not available (exceed action): Drop (or mark) the packet.

© 2006 Cisco Systems, Inc. All rights reserved. Single Token Bucket Class-Based Policing Bc is normal burst size. Tc is the time interval. CIR is the committed information rate. CIR = Bc / Tc

© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Traffic-Policing Mechanism Class-Based Policing Enable methodEnabled in policy map Conditions Actions Conform, exceed, violate Drop, set, transmit Implementations Single or dual token bucket, single- or dual- rate policing, multiactions

© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Traffic-Shaping Mechanisms Class-Based ShapingFRTS Restriction Shaper for any subinterface Shaper for Frame Relay only ClassificationClass-based Per DLCI or subinterface Link fragmentation and interleaving No support for FRF.12 Supports FRF.12 Frame Relay Support Understands BECN and FECN ConfigurationSupported via MQC

© 2006 Cisco Systems, Inc. All rights reserved. Applying Rate Limiting

© 2006 Cisco Systems, Inc. All rights reserved. Self Check 1.Which traffic conditioning mechanism adds delay? Why? 2.What are the recommendations for conditioning mechanisms with regard to link speed? 3.Which mechanism has the ability to re-mark packets that exceed the identified rate? 4.Does conform and exceed indicate with regard to the token bucket?

© 2006 Cisco Systems, Inc. All rights reserved. Summary  Traffic conditioners are QoS mechanisms that limit bandwidth, and include policing and shaping. Both of these approaches limit bandwidth, but each has different characteristics.  Policing typically limits bandwidth by discarding traffic that exceeds a specified rate.  Shaping limits excess traffic, not by dropping it but by buffering it.  The token bucket is used to determine if traffic flow exceeds or conforms to predetermined rates.

© 2006 Cisco Systems, Inc. All rights reserved. Q and A

© 2006 Cisco Systems, Inc. All rights reserved. Resources  Policing and Shaping Overview 31/products_configuration_guide_chapter09186a00800c60d1.ht ml  QoS Policing ology_support_protocol_home.html  Comparing Traffic Policing and Traffic Shaping for Bandwidth Limiting es_tech_note09186a00800a3a25.shtml

© 2006 Cisco Systems, Inc. All rights reserved.